• Title/Summary/Keyword: 인터넷 금융거래

Search Result 122, Processing Time 0.024 seconds

Technique To Strengthen The Security Of The User Authentication System Using Security Card And Password (보안카드와 비밀번호를 이용한 사용자 인증 시스템의 보안 강화 기법)

  • 박인국;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.257-262
    • /
    • 2003
  • 본 논문에서는 사용자만이 알고 있는 비밀번호와 그 사용자만이 소유하는 보안카드를 이용하여 계산된 변동비밀번호의 1회 입력만으로 비밀번호와 보안카드를 통합하여 동시에 확인함으로써 안전하게 사용자 인중을 할 수 있는 방법을 제시한다. 본 논문에서 제안하는 사용자 인중 시스템은 변동비밀번호의 1회 입력만으로 지식기반 인중의 비밀번호와 소유기반 인증의 보안카드를 동시에 확인하여 사용자 인중이 이루어지기 때문에 서버의 효율성을 증가시키며, 보안카드의 분실, 도난, 복제 둥에 따른 위험성과 비밀번호의 추측, 노출에 따른 위험성을 줄여 보다 안전한 사용자 인중 시스템을 구축할 수 있다. 또한 본 논문에서 제안하는 시스템은 현재 사용되고 있는 텔레뱅킹(폰뱅킹), 인터넷(PC)뱅킹, 증권 매매, 전자 결재 둥과 같은 기존의 비밀번호를 이용한 사용자 인중 시스템에 큰 교체 없이 적은 추가 비용으로 쉽게 적용하여 보다 안전한 인터넷과 금융 거래의 활성화에 기여할 수 있을 것이다.

  • PDF

Research on major technology trends in the field of financial security through Korea and foreign patent data analysis (국내외 특허 데이터 분석을 통한 금융보안 분야 주요 기술 동향 분석연구)

  • Chae, Ho-Kuen;Lee, Jooyeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.53-63
    • /
    • 2020
  • Electronic financial transactions are also actively increasing due to the rapid spread of information communication media such as the Internet, smart devices, and IoT, but as a derivative by-product, threats of financial security such as leakage of various personal information and hacking are also increasing. Therefore, the importance of financial security against this is increasing, but in Korea, financial security technology is relatively insufficient compared to advanced countries in the field of financial security, such as Active-X. Therefore, this study aims to present the major development direction in the domestic financial security field by comparing key technology trends with IPC classification frequency analysis, keyword frequency analysis, and keyword network analysis based on domestic and foreign financial security-related patent data. In conclusion, it seems that recent domestic and foreign trends have focused on the development of related technologies according to the development of smart device-based electronic financial services. Accordingly, it is intended to be used as the basis data for technology development of financial security by mapping the trend of financial security research trend and technology trend analysis through thesis data analysis that reflects the research of the preceding aspect as the technology of commercialization in the future.

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

A Study on Private Investigator's Role against Digital Related Social Problems (디지털 관련 사회문제와 탐정의 역할)

  • Hur Myung Bum;Kim Kwon Ho;Yeom Keon Ryeong
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.177-186
    • /
    • 2023
  • Modern society is operated based on the internet, wireless networks, and digital devices to the extent that it is called a digital society. In particular, as most of financial transactions, information movement, and commercial activities are based online, various social problems and side effects related to this are increasing rapidly. Representative examples include industrial espionage activities and leakage of industrial technology, and social problems such as illegal goods trade such as drugs using online and online gambling are increasing to a serious level. These digital-based social problems cannot be solved only by the activities and capabilities of judicial institutions such as police and prosecutors. Now that the private investigation market is open, active intervention using them is necessary. To this end, it is necessary to actively cultivate private investigator's ability to investigate and collect evidence in relation to digital social and criminal problems. In addition, each private investigation education institution or association should actively invest and research this.

Payment PKI based on EMV and Efficient IC Card Authentication Mechanism (EMV 기반의 전자지불 PKI와 효율적인 IC 카드 인증메커니즘)

  • Song Sang Heon;Choi Seok Jin;Ryou Jea Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.755-764
    • /
    • 2004
  • Recently 'Banking IC Card Standard' and EMV Standard by the domestic standard is selected, and it is situation that is developing infrastructure vigorously to alternate Magnetic Stripe card by IC card. This paper analyzes EMV standard that is selecting public key cipher, and research wishes to study unexhausted EMV PKI relatively than internet PKI, WAP PKI etc. This paper propose utilizable EMV base Payment PKI model in IC card base payment system development, and developed EMV CA system with this. Also, this paper supplemented IC card Authentication mechanism that is defined in EMV standard, and propose 'Efficient smart card Authentication mechanism' to improve performance of this mechanism, and estimate performance.

전파 표준시 방송을 위한 NDGPS 신호 활용 방안

  • Lee, Yeong-Gyu;Yang, Seong-Hun;Lee, Seung-U;Kim, Jun-Hwan;Choe, Seong-Su;Lee, Chang-Bok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.486-489
    • /
    • 2006
  • 현대 생활에 있어서 정확한 시간은 마치 공기와 같이 필요성이 직접적으로 확연하게 나타나지는 않지만, 첨단 통신, 항법, 금융 등의 산업 발전 및 국민의 일상 생활을 차질 없이 영위하기 위해서 없어서는 안 될 중요한 요소 중 하나이다. 광범위한 시각동기 응용 분야 중에서 본 논문에서는 특히 국민의 일상 생활과 밀접한 관계가 있는 수 ms 정도의 정확도를 갖는 타이밍 신호를 전국에 제공하기 위한 방안에 대해서 기술한다. 이러한 타이밍 신호의 응용 분야로는 열차, 지하철, 버스시간과 같이 수 초 정도의 정확도가 요구되는 경우, 인터넷통신 및 금융 거래와 같이 1초 이하의 정확도를 요구하는 경우, 교통 신호등과 같은 수백 ms 이내의 정확도가 요구되는 경우 등을 들 수 있다. 본 논문에서는 전파시계, 교통신호제어기, 전자상거래 등에서 요구되는 기준 시각을 제공하기 위한 방안 중 하나로 현재 해양수산부에서 운영하고 있는 NDGPS 비콘신호를 활용하여 전국적인 표준시의 방송 방안에 대해서 기술한다. 이를 위해서 유선전화망을 이용하여 표준시를 전송하는 방안, 수신된 표준시를 이용하여 방송할 타임태그를 작성하는 방법에 대해서 기술하였다. 또한 원격지 클럭에 대한 동기 성능을 분석하는 방법 및 이에 대한 결과를 제시하였다.

  • PDF

Countermeasures to the Vulnerability of the Keyboard Hardware (키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.187-194
    • /
    • 2008
  • This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.

항만물류산업의 XML/EDl 시스템 도입방안

  • 박남규;최형림;김현수;한계섭;이창섭
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2001.12a
    • /
    • pp.83-97
    • /
    • 2001
  • 국내의 항만물류산업에서는 서류 전송을 합리화하고 입력데이터의 오류를 없애기 위해 EDI를 도입·실행하여 왔다. 그러나, 기존의 항만물류산업에서 사용중인 전통적인 EDI는 사내 정보시스템과의 비연계성, 과중한 EDI 구축비용과 소프트웨어 구입비 및 EDI 통신료, 산업간 EDI 자료교환의 불가능, 업무프로세스의 개선 미약, 응답시간의 지연, 사용의 불편성, 표준문서 사용 등 제반 문제점들이 미해결 상태로 남아있다. 차세대 인터넷 언어로 각광받고 있는 XML은 기존의 데이터를 보다 쉽게 표현, 교환, 저장할 수 있어서 무역, 금융, 멀티미디어, 전자상거래 등 다양한 분야에 응용되고 있다. 특히 XML의 개방적이고, 유연한 특징으로 인해 상이한 데이터 및 문서포맷을 지닌 다수의 거래업체간에 뛰어난 상호운영성을 가져와 이를 이용하는 비율이 급속도로 증가하고 있으며, 이를 위해 다수의 XML기반 프레임워크가 개발되어 적용되고 있다. 본 논문에서는 XML/EDl, BizTalk 프레임워크, ebXML 프레임워크를 항만물류산업의 EDI시스템에 적용하여 이들의 구조를 밝혀내고 각 프레임워크의 유효성을 검증하고자 시도하였다.

  • PDF

Survey and Analysis of Mobile B2B Demand (모바일 B2B 수요에 대한 조사 분석 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.1-19
    • /
    • 2005
  • Due to the phenomenal growth in mobile internet users, mobile business as a type of applications of mobile internet has attracted the related industries' and academic researchers' attentions. However, most researchers focus on the issues of Mobile B2C collecting survey questions from consumers or internet users. This paper points out that Mobile B2B has distinct service sector and analyzes the current trend and demand of Mobile B2B in Korea by collecting survey questionnaire from specialists in mobile industries and people in universities and research institutes. Survey fields include business, market, contents/application, research and development and legal system. According to the survey results, Mobile B2B business will rise in distribution, finance, sales, and logistics industries from the beginning of 2005 using wireless PDA and the important preconditions will be security, certification, and standardization.

  • PDF

A Study of Short-term Won/Doller Exchange rate Prediction Model using Hidden Markov Model (은닉마아코프모델을 이용한 단기 원/달러 환율예측 모형 연구)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.229-235
    • /
    • 2012
  • Forex trading participants, due to the intensified economic internationalization exchange risk avoidance measures are needed. In this research, Model suitable for estimation of time-series data, such as stock prices and exchange rates, through the concealment of HMM and estimate the short-term exchange rate forecasting model is applied to the prediction of the future. Estimated by applying the optimal model if the real exchange rate data for a certain period of the future will be able to predict the movement aspect of it. Alleged concealment of HMM. For the estimation of the model to accurately estimate the number of states of the model via Bayesian Information Criterion was confirmed as a model predictive aspect of physical exercise aspect and predict the movement of the two curves were similar.